Protection of Information Assets: Security Event Management
Offered By: Pluralsight
Course Description
Overview
The auditor must be competent to assess cybersecurity incident management. This course will teach you cybersecurity management principles and best practices needed for the Certified Information Systems Auditor examination.
Protection of data and information assets requires a multi-faceted approach to preventing and monitoring security breaches and vulnerabilities. In this course, Protection of Information Assets: Security Event Management, you’ll learn to assess the effectiveness and adequacy of the security prevention and response program. First, you’ll explore information system attacks. Next, you’ll discover security monitoring and evidence collection. Finally, you’ll learn how to assess the security awareness program. When you’re finished with this course, you’ll have the skills and knowledge of Protection of Information Assets Security Event Management needed for the Certified Information Systems Auditor examination.
Protection of data and information assets requires a multi-faceted approach to preventing and monitoring security breaches and vulnerabilities. In this course, Protection of Information Assets: Security Event Management, you’ll learn to assess the effectiveness and adequacy of the security prevention and response program. First, you’ll explore information system attacks. Next, you’ll discover security monitoring and evidence collection. Finally, you’ll learn how to assess the security awareness program. When you’re finished with this course, you’ll have the skills and knowledge of Protection of Information Assets Security Event Management needed for the Certified Information Systems Auditor examination.
Syllabus
- Course Overview 1min
- Auditing Security Monitoring 66mins
- Auditing Security Incident Management 48mins
- Summary 3mins
Taught by
Kevin Henry
Related Courses
Information Security Management in a NutshellSAP Learning Enterprise and Infrastructure Security
New York University (NYU) via Coursera Personal Risk Reduction In Insecure Contexts
Politecnico di Milano via Polimi OPEN KNOWLEDGE Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Cyber Security Essentials: Your Role in Protecting the Company
Pluralsight